Remote Access Tool Using Metasploit

Main Article Content

Prakhar Ahlawat, Sushant Dhar, Samruddha Wagh, Amit Koppad

Abstract

A Remote Access Trojan (otherwise known as a RAT) is a piece of software designed to provide full access to a remote client. Capabilities of such a software often include: keystroke logging, file system access and remote control of the client with all the peripheral devices it is connected to, such as microphones and webcams. RATs are designed as legitimate administrative tools, yet due to their extensive capabilities are often seen used with malicious intent. The most common means of infection is through email attachments. The server is cleverly disguised as a significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. In this paper, our objective is to demonstrate how we can create our own RAT software/Trojan followed by a detailed explanation of the construction, deployment and working of the RAT software. The biggest advantage about creating your own RAT is that it is fully undetectable and you can add whichever features you desire.

Article Details

How to Cite
, P. A. S. D. S. W. A. K. (2017). Remote Access Tool Using Metasploit. International Journal on Recent and Innovation Trends in Computing and Communication, 5(4), 425–427. https://doi.org/10.17762/ijritcc.v5i4.431
Section
Articles